CN112651740A - Block chain transaction method and device and electronic equipment - Google Patents

Block chain transaction method and device and electronic equipment Download PDF

Info

Publication number
CN112651740A
CN112651740A CN202011554075.6A CN202011554075A CN112651740A CN 112651740 A CN112651740 A CN 112651740A CN 202011554075 A CN202011554075 A CN 202011554075A CN 112651740 A CN112651740 A CN 112651740A
Authority
CN
China
Prior art keywords
remitter
ciphertext
transaction amount
receiver
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011554075.6A
Other languages
Chinese (zh)
Inventor
马宝利
刘正
殷山
张文彬
李漓春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN202011554075.6A priority Critical patent/CN112651740A/en
Publication of CN112651740A publication Critical patent/CN112651740A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

One or more embodiments of the present specification provide a method and an apparatus for blockchain transaction, and an electronic device, which are applied to a remitter device, where the method includes: determining a transaction amount, wherein a remitter balance commitment ciphertext and a receiver balance commitment ciphertext are registered in the blockchain; generating a remitter transaction amount acceptance ciphertext and a receiver transaction amount acceptance ciphertext; and submitting a transaction to a blockchain, wherein the transaction comprises the information of the remitter blockchain account, the information of the receiver blockchain account, the remitter transaction amount commitment ciphertext and the receiver transaction amount commitment ciphertext, so that the remitter balance commitment ciphertext deducts the remitter transaction amount commitment ciphertext after the transaction is finished, and the receiver transaction amount commitment ciphertext is added to the receiver transaction amount commitment ciphertext after the transaction is finished.

Description

Block chain transaction method and device and electronic equipment
Technical Field
One or more embodiments of the present disclosure relate to the field of blockchain technologies, and in particular, to a method and an apparatus for blockchain transaction, and an electronic device.
Background
The blockchain can maintain a unified blockchain account book among all blockchain nodes by achieving consensus among all blockchain link nodes so as to permanently record transaction information occurring in the blockchain network. The blockchain ledger is fully public so as to facilitate viewing and verifying historical data of transactions that have occurred at any time, and thus the blockchain ledger itself has no privacy protection function.
Disclosure of Invention
In view of this, one or more embodiments of the present disclosure provide a blockchain transaction method applied to a remitter device, the method including:
determining a transaction amount to be remitted from a remitter blockchain account to a receiver blockchain account, wherein a remitter balance commitment ciphertext is registered in the remitter blockchain account and a receiver balance commitment ciphertext is registered in the receiver blockchain account, the remitter balance commitment ciphertext is calculated by a homomorphic encryption algorithm according to remitter balance and a public key of the remitter, and the receiver balance commitment ciphertext is calculated by the homomorphic encryption algorithm according to receiver balance and the public key of the receiver;
generating an remitter transaction amount commitment ciphertext and a receiver transaction amount commitment ciphertext, wherein the remitter transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm according to the transaction amount and a public key of the remitter, and the receiver transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm according to the transaction amount and the public key of the receiver;
and submitting a transaction to a blockchain, wherein the transaction comprises the information of the remitter blockchain account, the information of the receiver blockchain account, the remitter transaction amount commitment ciphertext and the receiver transaction amount commitment ciphertext, so that the remitter balance commitment ciphertext deducts the remitter transaction amount commitment ciphertext after the transaction is finished, and the receiver transaction amount commitment ciphertext is added to the receiver transaction amount commitment ciphertext after the transaction is finished.
Accordingly, the present specification also provides a blockchain transaction apparatus applied to remitter equipment, the apparatus comprising:
the system comprises a determining unit and a processing unit, wherein the determining unit determines a transaction amount to be remitted from a remitter blockchain account to a receiver blockchain account, the remitter blockchain account registers a remitter balance commitment ciphertext in a blockchain, the receiver blockchain account registers a receiver balance commitment ciphertext in the blockchain, the remitter balance commitment ciphertext is calculated by a homomorphic encryption algorithm according to remitter balance and a public key of the remitter, and the receiver balance commitment ciphertext is calculated by the homomorphic encryption algorithm according to receiver balance and the public key of the receiver;
the generating unit is used for generating remittance transaction amount commitment ciphertext and receiver transaction amount commitment ciphertext, wherein the remittance transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm through calculation according to the transaction amount and the public key of the remittance party, and the receiver transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm through calculation according to the transaction amount and the public key of the receiver;
and the submitting unit is used for submitting a transaction to a blockchain, wherein the transaction comprises the information of the remitter blockchain account, the information of the receiver blockchain account, the remitter transaction amount commitment ciphertext and the receiver transaction amount commitment ciphertext, so that the remitter transaction amount commitment ciphertext is deducted from the remitter transaction amount commitment ciphertext after the transaction is finished, and the receiver balance commitment ciphertext is added with the receiver transaction amount commitment ciphertext after the transaction is finished.
Accordingly, this specification also provides a computer device comprising: a memory and a processor; the memory having stored thereon a computer program executable by the processor; when the computer program is run by the processor, the blockchain transaction method is executed.
The blockchain transaction method, device and computer equipment provided by the specification provide a non-interactive transfer scheme, account balance and transaction amount privacy are protected under an account model of a blockchain, and transfer can be completed without participation of a receiving party. By using the technical scheme provided by the specification, the balance of the account can be seen only by the owner of the account, the transaction amount can be seen only by the transfer party and the transfer party of the transaction, and the blockchain node can verify the legality of the transaction for the encrypted transaction amount and update the legal transaction to the balance of the account of the transfer party and the transfer party. The advantage of this non-interactive implementation is that the transaction can be initiated only by the remitter, independent of the recipient and the network transmission with the recipient, thereby avoiding interference from factors such as the recipient being offline, response delays or network failures, network delays, etc.
Drawings
Fig. 1 is a flowchart of a blockchain transaction method according to an exemplary embodiment.
Fig. 2 is a schematic diagram of a money transfer transaction conducted in a blockchain network, according to an exemplary embodiment.
Fig. 3 is a flow diagram of a money transfer transaction conducted in a blockchain network, according to an exemplary embodiment.
Fig. 4 is a schematic structural diagram of an apparatus according to an exemplary embodiment.
Fig. 5 is a block diagram of a blockchain transaction device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
Fig. 1 is a flowchart of a blockchain transaction method according to an exemplary embodiment. As shown in fig. 1, the method is applied to an remitter device, and may include the following steps:
step 102, determining a transaction amount to be remitted from a remitter blockchain account to a receiver blockchain account, wherein a remitter balance commitment ciphertext is registered in the remitter blockchain account, a receiver balance commitment ciphertext is registered in the receiver blockchain account, the remitter balance commitment ciphertext is calculated by a homomorphic encryption algorithm according to remitter balance and a public key of the remitter, and the receiver balance commitment ciphertext is calculated by the homomorphic encryption algorithm according to receiver balance and a public key of the receiver.
The block chain in the above embodiments may specifically refer to a P2P network system with a distributed data storage structure, where each node is achieved through a consensus mechanism, data in the block chain is distributed in temporally consecutive blocks (blocks), and the latter block contains data digests of the former block, and full backup of data of all or part of the nodes is achieved according to different specific consensus mechanisms (such as POW, POS, DPOS, PBFT, and so on). It is well known to those skilled in the art that, since the blockchain system operates under a corresponding consensus mechanism, data that has been included in the blockchain database is difficult to be tampered with by any node, for example, a blockchain with Pow consensus is adopted, and it is possible to tamper with existing data only by an attack that requires at least 51% of effort on the whole network, so that the blockchain system has characteristics that other centralized database systems cannot reasonably guarantee data security and tamper resistance. It can be seen that in the embodiments provided in this specification, data included in the distributed database of the blockchain is not attacked or tampered, so that the transaction issued to the blockchain is certified.
In one embodiment, the remitter user and the recipient user may agree on a value for the transaction amount; the remitter user corresponds to the remitter device, the receiver user corresponds to the receiver device, a blockchain transaction scheme based on the specification can be realized between the remitter device and the receiver device, and an asset certificate corresponding to the transaction amount is remitted (or transferred) from the remitter blockchain account to the receiver blockchain account. The asset voucher may correspond to an intelligent asset such as a token (token) and a digital asset in a blockchain, and may also correspond to an off-chain asset such as cash, securities, coupons and real estate outside the blockchain, which is not limited in this specification.
The remitter balance commitment ciphertext or the receiver balance commitment ciphertext according to the embodiment is obtained by calculating according to the balance of the remitter or the receiver and the public key of the remitter or the receiver by using a homomorphic encryption algorithm. Because each block chain link point in the block chain needs to maintain a uniform block chain account book based on consensus respectively, the cryptograph about the balance commitment of the remittance party and the cryptograph about the balance commitment of the receiving party are only recorded in the block chain account book maintained by the block chain link points by registering the balance commitment cryptograph of the remittance party and the balance commitment of the receiving party in the block chain, and the balance of the remittance party and the balance of the receiving party are not directly recorded, so that the block chain balance held by the remittance party user and the block chain balance held by the receiving party user are hidden as private data, the block chain is stored for the account balances of the remittance party and the receiving party, the balance value is prevented from being tampered, and the privacy of the block chain account is maintained.
The above-mentioned method for registering remitter balance promise cryptograph or receiver balance promise cryptograph in the blockchain is not limited, and the remitter balance promise cryptograph or receiver balance promise cryptograph may be issued in the blockchain in the form of transaction, or the remitter balance promise cryptograph or receiver balance promise cryptograph may be registered in the account attribute of the remitter or receiver, or other methods that will be easily conceived by those skilled in the art.
In an embodiment, the homomorphic encryption algorithm may generate a random number, so that the random number and the unencrypted data are calculated as the corresponding committed ciphertext data, and thus, the committed ciphertext data may be decrypted by acquiring the random number to obtain the corresponding unencrypted data, or the committed ciphertext data may be verified by acquiring the random number to verify whether the committed ciphertext data corresponds to the unencrypted data. For example, the homomorphic encryption algorithm may be based on the Pedersen commitment mechanism in the related art, although the description is not limited thereto.
For example, the remitter account balance t is encrypted using a homomorphic encryption technique involving Pedersen Commitment (PC): the public parameters (G, H) are two generating elements of an elliptic curve, and the sink has a pair of public and private keys (Pk, Sk) based on the elliptic curve, wherein Pk is SkG; the Commitment ciphertext of the remitter balance t is (rG + tH, rPk), wherein rG + tH is Pedersen committee, and r is the random number used in the same-bit encryption. When decrypting (T, T ') (rG + tH, rPk), first, the key Sk is used to obtain rG ═ T ' Sk from T ' ═ rPk ═ rSkG-1Thus, the part containing the random number can be eliminated to obtain tH ═ T-rG. In addition, in order to decrypt the ciphertext tH of the amount, there is a setting that the amount t has a valid interval, e.g., [0,2 ]32]. There are various methods to decrypt the ciphertext tH of the amount, such as the Kangaroo method of Pollard, or to calculate and store the corresponding ciphertext set in this interval in advance, and finally to determine the value of t according to the table lookup of the value of tH, although this specification is not limited thereto.
Similarly, the recipient balance commitment ciphertext is generated by the same homomorphic encryption algorithm corresponding to the remitter balance commitment ciphertext, for example, by using the same elliptic curve-based generator G, H and based on the public key and the account balance of the recipient, so that the balance of the account of the recipient can be obtained only by decrypting the recipient balance commitment ciphertext through the private key of the recipient, and the privacy of the user account on the blockchain is protected.
And 104, generating a remittance transaction amount commitment ciphertext and a receiver transaction amount commitment ciphertext, wherein the remittance transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm according to the transaction amount and the public key of the remittance, and the receiver transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm according to the transaction amount and the public key of the receiver.
The remitter transaction amount acceptance ciphertext and the remitter balance acceptance ciphertext may adopt the same homomorphic encryption algorithm, so that the remitter transaction amount acceptance ciphertext may be directly deducted from the remitter transaction amount acceptance ciphertext, and the receiver transaction amount acceptance ciphertext may be directly added to the receiver transaction amount acceptance ciphertext.
In an embodiment, the remitter transaction amount acceptance ciphertext is calculated by the homomorphic encryption algorithm according to a remitter transaction amount random number r _ a, the transaction amount T _ a, and a public key Pk _ a of the remitter, where the remitter transaction amount acceptance ciphertext is (T _ a, T' _ a) ═ r _ AG + T _ AH, r _ APk _ a; similarly, the recipient transaction amount acceptance ciphertext is calculated by the homomorphic encryption algorithm according to a recipient transaction amount random number r _ B, the transaction amount T _ B and a recipient public key Pk _ B, where the recipient transaction amount acceptance ciphertext is (T _ B, T' _ B) ═ r _ BG + T _ BH, r _ BPk _ B; where t _ a is t _ B. It should be noted that, in order to enable the receiving party to generate a corresponding interval proof for the new transaction according to the updated account balance after receiving the transaction amount, the receiving party needs to know the specific value of r _ B; in order to prevent other nodes in the blockchain from knowing the value of r _ B to decrypt the transaction amount, the remitter needs to send r _ B in the transaction to the receiver through an off-chain channel, which does not affect the transaction in progress, and after the transaction, the remitter sends the transaction through email or other way that is well agreed with the receiver in advance, which is not limited in this specification.
Because the transaction commitment of the remitter and the transaction commitment of the receiver sent by the remitter are both ciphertexts, other nodes cannot know the value of t _ A remitted by the remitter, and do not know whether t _ A sent by the remitter is the same as t _ B received by the receiver; the receiving party decrypts the transaction acceptance of the receiving party sent by the remitter by using its own private key, and although the value of T _ B can be known, it still cannot know whether the received T _ B is the same as the T _ a sent by the remitter, so in another embodiment of the present specification, the remitter further issues the difference r between the random number r _ a and the random number r _ B to the block chain, so that the block chain link point in the block chain verifies whether the values of rG and T _ a-T _ B are equal, and if the values are equal, it proves that T _ a is T _ B.
This includes a special case in which the remitter transaction amount commitment ciphertext (T _ a, T '_ a) (rG + tH, rPk _ a)) and the receiver transaction amount commitment ciphertext (T _ B, T' _ B) ((rG + tH, rPk _ B) are calculated using the same r _ a ═ r _ B and the same T _ a ═ T _ B. In this particular case, the transaction amount may not be differentiated into the remitter transaction amount and the recipient transaction amount, and the commitment cryptogram thereof may be aggregated into one (rG + tH, rPk _ a, rPk _ B). In this particular case, the following technical details may be simplified, since the manner of simplification is obvious, and the invention is not additionally described in detail in every conceivable detail.
In an embodiment, when the remittance transaction amount commitment ciphertext is calculated by the homomorphic encryption algorithm according to the transaction amount and the public key of the remittance, and the receiver transaction amount commitment ciphertext is calculated by the homomorphic encryption algorithm according to the transaction amount and the public key of the receiver, since other nodes in the block chain cannot know from the receiver transaction amount commitment ciphertext whether the receiver transaction amount commitment ciphertext is generated based on the public key of the receiver (whether the public key is the same as the public key used in the receiver balance commitment ciphertext), or cannot know whether the receiver transaction amount commitment ciphertext can be decrypted by the private key of the receiver to obtain the transaction amount; the method comprises the steps that verification of a receiving party transaction amount acceptance ciphertext issued by a remitter by other nodes is completed, transaction fraud of the remitter is prevented, the remitter also issues a receiving party public key certificate to the block chain, so that block chain nodes in the block chain can verify that the receiving party transaction amount acceptance ciphertext and the receiving party balance acceptance ciphertext are calculated by the homomorphic encryption algorithm based on the same public key, wherein the receiving party public key certificate is generated by the homomorphic encryption algorithm based on the receiving party transaction amount acceptance ciphertext.
In one embodiment, the exhibitor generates the public key proof Pf to prove that the recipient's transaction amount commitment ciphertext (T _ B, T ' _ B) — (r _ BG + T _ BH, r _ BPk _ B) is encrypted with B's public key Pk _ B as follows:
generating a pair of random numbers (r ', T'), calculating a random number commitment ciphertext (T, T ') (r' G + T 'H, r' Pk _ B) by using the same homomorphic encryption algorithm as that used for generating the receiver transaction amount commitment ciphertext, wherein Pk _ B is a public key used in the receiver balance commitment ciphertext;
calculating hashes u-Hash (T _ B, T '_ B, T') and v-u r _ B + r ', w-u T _ B + T', wherein Hash represents a Hash operation, v is a first authentication element corresponding to a first authentication random number r ', and w is a second authentication element corresponding to a second authentication random number T';
pf is generated as (T, T'; v, w).
When verifying that whether a recipient transaction amount acceptance ciphertext sent by the remitter is the same as a public key used in the recipient balance acceptance ciphertext, other nodes in the block chain acquire Pf (T, T '; v, w) to verify whether (vG + wH, v Pk _ B) (uT _ B + T, uT ' _ B + T ') is correct;
if the balance acceptance ciphertext is correct, the balance acceptance ciphertext of the receiving party and the transaction amount acceptance ciphertext of the receiving party are calculated by the homomorphic encryption algorithm based on the same public key, and the transaction amount acceptance ciphertext of the receiving party can be decrypted by a private key corresponding to the public key to obtain the transaction amount;
if the transaction is not correct, the transaction is rejected, at the moment, the remittance encrypts the transaction amount by using the public key of the non-receiving party to generate the transaction amount acceptance ciphertext of the receiving party, even if a random number is used as the transaction amount acceptance ciphertext of the receiving party, the transaction amount acceptance ciphertext of the receiving party is updated to the balance acceptance ciphertext of the receiving party, the receiving party cannot decrypt the rest amount acceptance ciphertext or remit the asset from the account of the receiving party, namely the account of the receiving party is damaged.
The implementation scheme of the public key certification of the receiving party adopted by the invention prevents the account from being damaged, does not need the participation of the receiving party, and is a non-interactive mode.
In yet another embodiment, as described in the previous embodiment, the remitter balance commitment ciphertext is calculated by the homomorphic encryption algorithm according to a remitter random number, a remitter balance, and a public key of the remitter, as described in the previous embodiment, the remitter balance commitment ciphertext (S _ a, S '_ a) ((r' _ AG + S _ AH, r '_ APk _ a), where S _ a is the remitter balance, and the remitter transaction amount commitment ciphertext is calculated by the homomorphic encryption algorithm according to the remitter transaction amount random number, the transaction amount, and the public key of the remitter, i.e., the remitter transaction amount commitment ciphertext is (T _ a, T' _ a) ((r _ AG + T _ AH, r _ APk _ a), where T _ a is the transaction amount; the remitter device may generate an interval certificate according to the remitter random number r ' _ a, the remitter balance S _ a, the remitter balance commitment ciphertext (S _ a, S ' _ a), the remitter transaction amount random number r _ a, the transaction amount T _ a, and the transaction commitment ciphertext (T _ a, T ' _ a), and add the interval certificate to the transaction, so that a block link point in the block chain may verify whether the transaction amount satisfies: the transaction amount t _ a is not less than 0 and the transaction amount t _ a is not greater than the remitter balance s _ a. For example, a Range Proof (Range Proof) technique in the related art, such as a buckletprofofs scheme or a Borromean ring signature scheme, may be used, and the present specification does not limit this.
In an embodiment, the remitter device may generate, by using a remitter private key, an electronic signature related to the remitter transaction amount commitment ciphertext and the receiver transaction amount commitment ciphertext, and add the electronic signature to a transaction issued by the remitter to the blockchain, so as to perform electronic signature verification on the blockchain link point in the blockchain. In another embodiment, the remitter signature may be related to a difference between the remitter transaction amount random number and the receiver transaction amount random number, or the receiver public key certificate, or the interval certificate, and when the remitter signature is not included in the transaction, the block link node may determine that the consensus fails, thereby rejecting the transaction.
Step 106, submitting a transaction to a blockchain, wherein the transaction includes the information of the remitter blockchain account, the information of the receiver blockchain account, the remitter transaction amount commitment ciphertext and the receiver transaction amount commitment ciphertext, so that the remitter balance commitment ciphertext deducts the remitter transaction amount commitment ciphertext after the transaction is completed, and the receiver balance commitment ciphertext increases the receiver transaction amount commitment ciphertext after the transaction is completed, that is:
(S_A,S'_A)-(T_A,T'_A)=(S_A-T_A,S'_A-T'_A),
(S_B,S'_B)+(T_B,T'_B)=(S_B+T_B,S'_B+T'_B)。
in the above embodiment, the remitter transaction amount acceptance ciphertext and the receiver transaction amount acceptance ciphertext are used in the transaction, so that only the transaction acceptance ciphertext is recorded in the blockchain account book, and the corresponding transaction amount cannot be obtained, thereby hiding and keeping secret the value of the transaction amount. Meanwhile, the remitter balance commitment ciphertext corresponding to the remitter balance, the receiver balance commitment ciphertext corresponding to the receiver balance, the remitter transaction amount commitment ciphertext corresponding to the transaction amount and the receiver transaction amount commitment ciphertext are generated by using the same homomorphic encryption algorithm, so that deduction operation can be directly realized between the remitter balance commitment ciphertext and the remitter transaction amount commitment ciphertext and addition operation can be directly realized between the receiver balance commitment ciphertext and the receiver transaction amount commitment ciphertext under the condition that other nodes of a blockchain do not need to acquire the remitter balance, the receiver balance and the transaction amount, and the transaction can be smoothly completed under the condition that privacy data are exposed.
In one embodiment, after receiving the transaction, the blockchain node may check whether the transaction has been executed through a duplicate prevention or replay prevention mechanism in the related art; if so, execution of the transaction is denied.
For ease of understanding, the technical solutions of the present specification will be described in detail below by taking a remittance transaction in a blockchain network as an example. Fig. 2 is a schematic diagram of a money transfer transaction conducted in a blockchain network, according to an exemplary embodiment. As shown in fig. 2, assume a block chain remittance is made by user a to user B; in this specification, a "user" may be represented as a logged-in user account, and the user account may actually belong to an individual or an organization, which is not limited in this specification.
Assuming that the remitter device used by the user a is the user device 1, for example, a user account corresponding to the user a is logged in the user device 1; similarly, the receiver device used by user B is user device 2. The ue 1 may run a client program with a blockchain, so that the ue 1 has a corresponding blockchain link point in the blockchain network, such as the node 1 shown in fig. 2. Similarly, the ue 2 may run a client program with a blockchain, so that the ue 2 has a corresponding blockchain link point in the blockchain network, such as the node 2 shown in fig. 2. Other blockchain nodes, such as node i shown in fig. 2, etc., exist in the blockchain network, and are not listed here. Through the node 1, the node 2 and the like, remittance transaction between the user A and the user B can be implemented through the blockchain network, and relevant transaction information can be recorded into blockchain accounts respectively maintained by each blockchain link point, so that tampering can be avoided, and follow-up inspection is facilitated.
With respect to the money transfer transaction scenario of fig. 2, fig. 3 is a flow diagram of one exemplary embodiment for conducting a money transfer transaction in a blockchain network; as shown in fig. 3, the interaction process between the remitter and the block link point may include the steps of:
at step 301, a transaction amount t _ a to be remitted from the remitter blockchain account to the recipient blockchain account is determined.
In one embodiment, the remitter plays a role in remitting money and other resources in the remittance transaction, and the receiver plays a role in receiving money and other resources in the remittance transaction. For example, in the embodiment shown in fig. 2, user equipment 1 may be configured as an remitter and user equipment 2 may be configured as a recipient.
The remitter blockchain account registers remitter balance commitment ciphertext in a blockchain:
(S_A,S'_A)=(r'_AG+s_AH,r'_APk_A);
the recipient block chain account registers a recipient balance commitment ciphertext in the block chain:
(S_B,S'_B)=(r'_BG+s_BH,r'_BPk_B);
the remitter balance commitment ciphertext (S _ A, S '_ A) is obtained by calculation according to a remitter balance S _ A and a public key Pk _ A of the remitter through a homomorphic encryption algorithm, and the receiver balance commitment ciphertext (S _ B, S' _ B) is obtained by calculation according to a receiver balance S _ B and a public key Pk _ B of the receiver through the homomorphic encryption algorithm; the random number of balance of the remitter r '_ a and the random number of balance of the receiver r' _ B are random numbers used by the homomorphic encryption algorithm described above, and G, H are two tuples of the elliptic curve algorithm.
Step 302, generating an remitter transaction amount commitment ciphertext (T _ a, T '_ a) ((r _ AG + T _ AH, r _ APk _ a), and a receiver transaction amount commitment ciphertext (T _ B, T' _ B) ((r _ BG + T _ BH, r _ BPk _ B);
the remittance transaction amount commitment ciphertext (T _ A, T '_ A) is obtained by the homomorphic encryption algorithm through calculation according to the transaction amount T _ A and a public key Pk _ A of the remittance, the receiver transaction amount commitment ciphertext (T _ B, T' _ B) is obtained by the homomorphic encryption algorithm through calculation according to the transaction amount T _ B and a public key Pk _ B of the receiver, and T _ B is T _ A; the random number r _ a of the transaction amount of the remitter and the random number r _ B of the transaction amount of the receiver are random numbers used by the homomorphic encryption algorithm, and the two-element set G, H of the original elliptic curve algorithm is still used in the generation process of the ciphertext.
Further, in order to enable other nodes in the blockchain to verify that t _ B is t _ a, r is r _ a-r _ B should be generated in the next step 303.
In yet another embodiment, to ensure successful completion of the money transfer transaction, the block link points are required to determine the amount of money transfer t _ A, account balance sAThe value of (A) satisfies the following conditions: t _ A is greater than or equal to 0 and sA-t is not less than 0; the interval certification technology may enable the block chain node to verify whether the transaction meets the preset condition in the ciphertext state, for example, the specification may be implemented by using a bullletprofofs scheme, a Borromean ring signature scheme, and the like in the related art, which is not limited in the specification. The remitter may generate the sum (r) using interval proving techniquesA,sA,SAR, T, T) interval proof PR for subsequent process to verify whether T _ A is greater than or equal to 0 and sAT is not less than 0. For example as shown in fig. 3:
in step 304, an interval attestation RP1 is generated to attest that t _ A ≧ 0.
Step 305, an interval proof RP2 is generated to prove that s _ A-t _ A ≧ 0.
In order for the node in the blockchain to verify that the recipient transaction amount acceptance ciphertext (T _ B, T ' _ B) is encrypted in the same encryption manner as the recipient balance acceptance ciphertext (s _ B, s ' _ B) and can be decrypted by the recipient's private key to correctly obtain the transaction amount and update it to the account balance, the remitter should also generate a recipient public key certificate, as shown in fig. 3:
at step 306, proof Pf is generated to prove that (T _ B, T '_ B) is encrypted with B's public key Pk _ B.
In an embodiment, the process of generating the proof Pf may include:
generating a pair of random numbers (r ', t');
calculating a random number commitment ciphertext (T, T ') (r' G + T 'H, r' Pk _ B) by using the same homomorphic encryption algorithm as the homomorphic encryption algorithm used for generating the receiver transaction amount commitment ciphertext, wherein Pk _ B is a public key used in the receiver balance commitment ciphertext;
calculating a Hash u ═ Hash (T _ B, T '_ B, T'), v ═ ur _ B + r ', w ═ ut _ B + T', where Hash represents a Hash operation, v is a first authentication element corresponding to a first authentication random number r ', and w is a second authentication element corresponding to a second authentication random number T';
pf is generated as (T, T'; v, w).
Step 307, the remitter uses the electronic signature Sign A of the private key pair (A, T _ A, T '_ A; B, T _ B, T' _ B) corresponding to Pk _ A, wherein A, B is the account or account address of the remitter and the receiver respectively, and is used for assisting other nodes of the block chain to verify the remitter and the receiver of the transaction transfer; it should be noted that the present embodiment does not limit the content object signed by the electronic signature of the remitter, and may include a, T _ a, T '_ a, B, T _ B, T' _ B, and may further include one or more of r, RP1, RP2, and Pf.
Step 308, the remitter submits the generated ciphertexts (T _ A, T '_ A; T _ B, T' _ B) and the accounts or account addresses of the remitter and the receiver to the network of the block chain for node pair of the waiting block chain to perform consensus verification on the transaction in a transaction format so as to finally record the cryptograms into the distributed account book of the block chain; preferably, in order to assist the node of the blockchain to perform consensus verification on the transaction, the generated certification parameters (r, RP1, RP2, Pf) and the electronic signature Sign a may be added to the content of the transaction.
In one embodiment, the transferor may submit the corresponding transaction described above to the blockchain through node 1 to perform the money transfer. The transaction is transmitted to all blockchain nodes in the blockchain network and the contents and format of the transaction are verified separately by each blockchain node to perform a money transfer operation if the verification passes and to reject money transfers if the verification fails.
The blockchain node herein may represent any blockchain node in the blockchain network, i.e., each blockchain node in the blockchain network receives the transaction, e.g., (a, T _ a, T '_ a; B, T _ B, T' _ B; r, RP1, RP2, Pf; Sign a), and performs the verification through steps 309-312, etc.
In step 309, the block node checks whether the transaction has been executed.
In one embodiment, the blockchain node upon receipt of the money transfer transaction (A, T _ A, T '_ A; B, T _ B, T' _ B; r, RP1, RP2, Pf; Sign A) may verify that the money transfer transaction has been performed using a copy-protection or replay-protection mechanism of the blockchain related art; if so, execution of the money transfer transaction may be denied or otherwise, processing proceeds to step 310.
In step 310, the block nodes check the signature Sign a.
In one embodiment, the block node may check whether the signature Sign a included in the money transfer transaction is correct; if not, the money transfer transaction may be denied, otherwise, the process proceeds to step 311.
In step 311, the block link point verifies if t _ A is equal to t _ B.
In one embodiment, it is verified whether T _ a is equal to T _ B by verifying that rG is correct; if not, execution of the money transfer transaction may be denied, otherwise, processing proceeds to step 312.
Step 312, verifying that t _ A is not less than 0 by the block chain node;
in one embodiment, block link points may check interval certification PR1 contained in the money transfer transaction based on interval certification techniques to determine if t _ A ≧ 0 is satisfied; if not, execution of the money transfer transaction may be denied, otherwise, transfer is made to step 313.
Step 313, verifying that s _ A-t _ A is more than or equal to 0 by the block chain node;
in one embodiment, block link points may check interval certification PR2 contained in the money transfer transaction based on interval certification techniques to determine if s _ A-t _ A ≧ 0 is satisfied; if not, execution of the money transfer transaction may be denied, otherwise, processing proceeds to step 314.
In step 314, the block link point verifies whether the amount ciphertext (T _ B, T '_ B) and the recipient balance commitment ciphertext (s _ B, s' _ B) are calculated by the homomorphic encryption algorithm based on the same public key Pk _ B.
In one embodiment, a block link point may verify that (vG + wH, v Pk _ B) — whether (uT _ B + T, uT '_ B + T') is correct for each parameter in Pf included in the money transfer transaction; if not, execution of the money transfer transaction may be denied, otherwise, processing proceeds to step 315.
Step 315, the blockchain link point updates account balances of the blockchain accounts respectively corresponding to the user a and the user B in the maintained blockchain account book.
In an embodiment, after passing the verification in steps 309 to 314, the blockchain link point may subtract the balance commitment ciphertext (S _ a, S '_ a) corresponding to the remitter account balance S _ a and the balance commitment ciphertext (S _ B, S' _ B) corresponding to the receiver account balance S _ B from the balance commitment ciphertext (S _ a, S '_ a) corresponding to the remitter account balance S _ a and the balance commitment ciphertext (S _ B, S' _ B) corresponding to the receiver account balance S _ B recorded in the blockchain ledger, so that the balance commitment of the blockchain account 1 corresponding to the user a is updated to S _ a-T _ a and the balance commitment of the blockchain account 2 corresponding to the user B is updated to S _ B + T _ B, where T _ a is T _ B.
Based on the nature of the homomorphic encryption algorithm, when the balance commitment ciphertext (S _ A, S ' _ A) is updated to [ (S _ A, S ' _ A) - (T _ A, T ' _ A) ], the balance commitment ciphertext is generated
(S_A,S'_A)-(T_A,T'_A)=(S_A-T_A,S'_A-T'_A),
And (S _ a-T _ a, S '_ a-T' _ a) — (r '_ a-r _ a) G + (S _ a-T _ a) H, (r' _ a-r _ a) Pk _ a),
therefore, other nodes in the blockchain update the account balance of the remitter to (s _ a-t _ a) through consensus verification by the blockchain nodes, without knowing the specific value of the remitter's account balance s _ a and without knowing the transaction amount t _ a remitted by the remitter.
Similarly, based on the nature of the homomorphic encryption algorithm, when the balance commitment ciphertext (S _ B, S '_ B) is updated to [ (S _ B, S' _ B) + (T _ B, T '_ B) ], the balance commitment ciphertext is updated to the balance commitment ciphertext (S _ B, S' _ B)
(S_B,S'_B)+(T_B,T'_B)=(S_B+T_B,S'_B+T'_B),
And (S _ B + T _ B, S '_ B + T' _ B) — (r '_ B + r _ B) G + (S _ B + T _ B) H, (r' _ B + r _ B) Pk _ B),
therefore, other nodes in the blockchain update the account balance of the recipient to (s _ B + t _ B) by consensus verification of the blockchain nodes, without knowing the specific value of the account balance s _ B of the recipient and without knowing the transaction amount t _ B remitted by the remitter.
Optionally, to ensure that the receiving party can perform the transfer transaction based on the account balance after accepting the transaction, the above embodiment may include step 316: the remitter may send the random number r _ B of the transaction amount of the receiver to the receiver through an out-of-chain channel.
In summary, by using a homomorphic encryption mechanism, the account balance of the blockchain account can be encrypted, the encrypted balance commitment ciphertext is recorded in the blockchain account book, the remittance amount can be encrypted in the remittance transaction process, the encrypted remittance commitment ciphertext is used for implementing remittance transaction, the remittance transaction can be smoothly completed through the blockchain network under the condition that the account balance and the remittance amount are kept secret, and the verification operation of the blockchain link point on the transaction condition is not influenced, so that the blockchain network has a privacy protection function. In the embodiments provided in this specification, the remittance operation can be completed only by generating remittance and verification parameters and submitting a transaction by the remitter and after the consensus verification of the transaction contents is completed by other nodes in the blockchain, and the remittance operation is completed without participation of node equipment of the receiver in the whole process and without depending on the receiver and network transmission with the receiver, thereby avoiding interference of factors such as offline of the receiver, response delay or network failure, network delay and the like.
It should be noted that the present specification does not limit the sequence of generating the certificates or electronic signatures (e.g., r, RP1, RP2, Pf, Sign a, etc.), nor the sequence of verifying the certificates or electronic signatures and the contents of the transactions proposed by the remitter by the nodes in the block chain, and fig. 3 is only an embodiment of the transaction generation and verification method provided in the present specification, and the present specification is not limited thereto.
FIG. 4 is a schematic block diagram of an apparatus provided in an exemplary embodiment. Referring to fig. 4, at the hardware level, the apparatus includes a processor 402, an internal bus 404, a network interface 406, a memory 408, and a non-volatile memory 410, but may also include hardware required for other services. The processor 402 reads a corresponding computer program from the non-volatile memory 410 into the memory 408 and then runs the computer program to form a blockchain transaction apparatus on a logical level. Of course, besides software implementation, the one or more embodiments in this specification do not exclude other implementations, such as logic devices or combinations of software and hardware, and so on, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
Referring to fig. 5, in a software implementation, the blockchain transaction apparatus applied to the remitter device 50 may include:
a determining unit 502, configured to determine a transaction amount to be remitted from a remitter blockchain account to a receiver blockchain account, where the remitter blockchain account has a remitter balance commitment ciphertext registered in a blockchain, and the receiver blockchain account has a receiver balance commitment ciphertext registered in a blockchain, the remitter balance commitment ciphertext is calculated by a homomorphic encryption algorithm according to a remitter balance and a public key of the remitter, and the receiver balance commitment ciphertext is calculated by the homomorphic encryption algorithm according to a receiver balance and a public key of the receiver;
a generating unit 504, configured to generate an remitter transaction amount commitment ciphertext and a receiver transaction amount commitment ciphertext, where the remitter transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm through calculation according to the transaction amount and a public key of the remitter, and the receiver transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm through calculation according to the transaction amount and a public key of the receiver;
a submitting unit 506, configured to submit a transaction to a blockchain, where the transaction includes the information of the remitter blockchain account, the information of the receiver blockchain account, the remitter transaction amount commitment ciphertext, and the receiver transaction amount commitment ciphertext, so that the remitter transaction amount commitment ciphertext is deducted from the remitter transaction amount commitment ciphertext after the transaction is completed, and the receiver balance commitment ciphertext is added to the receiver transaction amount commitment ciphertext after the transaction is completed.
Preferably, the remittance transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm through calculation according to the remittance transaction amount random number, the transaction amount and the public key of the remittance party, and the receiver transaction amount commitment ciphertext is obtained by the homomorphic encryption algorithm through calculation according to the receiver transaction amount random number, the transaction amount and the public key of the receiver;
the generation unit 504:
generating a difference value between the remitter transaction amount random number and the receiver transaction amount random number;
and adding the difference value of the remitter transaction amount random number and the receiver transaction amount random number into the transaction so that block chain nodes in a block chain verify that the transaction amount encrypted by the remitter transaction amount acceptance ciphertext is equal to the transaction amount encrypted by the receiver transaction amount acceptance ciphertext.
Preferably, the generating unit 504:
generating a receiver public key certificate, wherein the receiver public key certificate is generated by the homomorphic encryption algorithm based on the receiver transaction amount commitment ciphertext;
and adding the receiver public key certificate into the transaction so that the block chain link points in the block chain can verify that the receiver transaction amount commitment ciphertext and the receiver balance commitment ciphertext are calculated by the homomorphic encryption algorithm based on the same public key.
Preferably, the generating unit 504:
generating a first authentication random number and a second authentication random number;
generating, by the homomorphic encryption algorithm, a random number acceptance ciphertext based on the first authentication nonce, the second authentication nonce, and the public key of the recipient;
carrying out hash operation on the transaction amount acceptance ciphertext of the receiving party to obtain a hash abstract;
calculating and generating a first verification element corresponding to the first verification random number and a second verification element corresponding to the second verification random number according to the Hash abstract;
the receiver public key certificate comprises the random number commitment ciphertext, the first verification element and the second verification element.
Preferably, the remittance balance commitment ciphertext is obtained by calculating according to the remittance balance, the public key of the remittance and the remittance random number by the homomorphic encryption algorithm;
the generation unit 504:
generating interval certification according to the remitter random number, the remitter transaction amount random number, the remitter balance commitment ciphertext, the transaction amount and the remitter transaction amount commitment ciphertext;
adding the interval certification to the transaction for a block link point in the block chain to verify whether the transaction amount satisfies: the transaction amount is not less than 0 and the transaction amount is not greater than the remittance balance.
Preferably, the generating unit 504:
generating an remitter electronic signature related to the remitter transaction amount acceptance ciphertext and the receiver transaction amount acceptance ciphertext through a remitter private key;
adding the electronic signature to the transaction for electronic signature verification by the blockchain link points in the blockchain.
Preferably, the apparatus further comprises:
and the out-of-chain sending unit is used for sending the random number of the transaction amount of the receiving party to the receiving party through an out-of-chain channel.
The implementation processes of the functions and actions of each unit in the device are specifically described in the implementation processes of the corresponding steps in the method, and related parts are described in the partial description of the method embodiment, which is not described herein again.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
Corresponding to the method embodiment, the embodiment of the present specification further provides a computer device, which includes a memory and a processor. Wherein the memory has stored thereon a computer program executable by the processor; the processor, when executing the stored computer program, performs the steps of the blockchain transaction method of the embodiments of the present specification. For a detailed description of the steps of the transaction method of the blockchain, reference is made to the previous contents, which are not repeated.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data.
Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.

Claims (13)

1. A blockchain transaction method is applied to remitter equipment, and the method comprises the following steps:
determining a transaction amount to be remitted from the remitter blockchain account to the recipient blockchain account; the remitter block chain account is registered with a remitter balance commitment ciphertext in a block chain, and the remitter balance commitment ciphertext is obtained by calculation of a homomorphic encryption algorithm according to remitter balance and a public key of the remitter; the recipient block chain account registers a recipient balance commitment ciphertext in a block chain, and the recipient balance commitment ciphertext is obtained by the homomorphic encryption algorithm according to recipient balance and a public key of the recipient;
calculating by the homomorphic encryption algorithm according to the transaction amount and the public key of the remitter to generate a remitter transaction amount commitment ciphertext; calculating by the homomorphic encryption algorithm according to the transaction amount and the public key of the receiver to generate a receiver transaction amount commitment ciphertext, and generating a receiver public key certificate by the homomorphic encryption algorithm based on the receiver transaction amount commitment ciphertext;
and submitting a transaction to a blockchain, wherein the transaction comprises the information of the remitter blockchain account, the information of the receiver blockchain account, the remitter transaction amount acceptance ciphertext, the receiver transaction amount acceptance ciphertext and the receiver public key certificate, so that the blockchain link in the blockchain verifies that the receiver transaction amount acceptance ciphertext and the receiver balance acceptance ciphertext are calculated by the homomorphic encryption algorithm based on the same public key, the remitter transaction amount acceptance ciphertext is deducted from the remitter transaction amount acceptance ciphertext after the transaction is completed, and the receiver balance acceptance ciphertext is added with the receiver transaction amount acceptance ciphertext after the transaction is completed.
2. The method according to claim 1, wherein the remitter transaction amount acceptance ciphertext is calculated by the homomorphic encryption algorithm according to the remitter transaction amount random number, the transaction amount and the public key of the remitter, and the receiver transaction amount acceptance ciphertext is calculated by the homomorphic encryption algorithm according to the receiver transaction amount random number, the transaction amount and the public key of the receiver;
the method further comprises the following steps:
generating a difference value between the remitter transaction amount random number and the receiver transaction amount random number;
and adding the difference value of the remitter transaction amount random number and the receiver transaction amount random number into the transaction so that block chain nodes in a block chain verify that the transaction amount encrypted by the remitter transaction amount acceptance ciphertext is equal to the transaction amount encrypted by the receiver transaction amount acceptance ciphertext.
3. The method of claim 1, the generating a recipient public key attestation comprising:
generating a first authentication random number and a second authentication random number;
generating, by the homomorphic encryption algorithm, a random number acceptance ciphertext based on the first authentication nonce, the second authentication nonce, and the public key of the recipient;
performing hash operation on the transaction amount acceptance ciphertext of the receiving party and the random number acceptance ciphertext to obtain a hash abstract;
calculating and generating a first verification element corresponding to the first verification random number and a second verification element corresponding to the second verification random number according to the Hash abstract;
the receiver public key certificate comprises the random number commitment ciphertext, the first verification element and the second verification element.
4. The method of claim 3, wherein the remitter balance commitment ciphertext is calculated by the homomorphic encryption algorithm from a remitter balance, the remitter public key, and a remitter random number;
the method further comprises the following steps:
generating interval certification according to the remitter random number, the remitter transaction amount random number, the remitter balance commitment ciphertext, the transaction amount and the remitter transaction amount commitment ciphertext;
adding the interval certification to the transaction for a block link point in the block chain to verify whether the transaction amount satisfies: the transaction amount is not less than 0 and the transaction amount is not greater than the remittance balance.
5. The method of any of claims 1 to 4, further comprising:
generating an remitter electronic signature related to the remitter transaction amount acceptance ciphertext and the receiver transaction amount acceptance ciphertext through a remitter private key;
adding the electronic signature to the transaction for electronic signature verification by the blockchain link points in the blockchain.
6. The method of claim 2, further comprising:
and sending the random number of the transaction amount of the receiving party to the receiving party through an off-chain channel.
7. A blockchain transaction apparatus for use with remitter devices, the apparatus comprising:
a determining unit that determines a transaction amount to be remitted from the remitter blockchain account to the receiver blockchain account; the remitter block chain account is registered with a remitter balance commitment ciphertext in a block chain, and the remitter balance commitment ciphertext is obtained by calculation of a homomorphic encryption algorithm according to remitter balance and a public key of the remitter; the recipient block chain account registers a recipient balance commitment ciphertext in a block chain, and the recipient balance commitment ciphertext is obtained by the homomorphic encryption algorithm according to recipient balance and a public key of the recipient;
the generating unit is used for calculating by the homomorphic encryption algorithm according to the transaction amount and the public key of the remitter to generate a remitter transaction amount commitment ciphertext; calculating by the homomorphic encryption algorithm according to the transaction amount and the public key of the receiver to generate a receiver transaction amount commitment ciphertext, and generating a receiver public key certificate by the homomorphic encryption algorithm based on the receiver transaction amount commitment ciphertext;
the submitting unit submits a transaction to a blockchain, wherein the transaction comprises the information of the remitter blockchain account, the information of the receiver blockchain account, the remitter transaction amount acceptance ciphertext, the receiver transaction amount acceptance ciphertext and the receiver public key certification, so that the blockchain link points in the blockchain verify that the receiver transaction amount acceptance ciphertext and the receiver balance acceptance ciphertext are calculated by the homomorphic encryption algorithm based on the same public key, the remitter transaction amount acceptance ciphertext is deducted from the remitter transaction amount acceptance ciphertext after the transaction is completed, and the receiver balance acceptance ciphertext is added with the receiver transaction amount acceptance ciphertext after the transaction is completed.
8. The apparatus according to claim 7, wherein the remitter transaction amount acceptance ciphertext is calculated by the homomorphic encryption algorithm according to the remitter transaction amount random number, the transaction amount and the public key of the remitter, and the receiver transaction amount acceptance ciphertext is calculated by the homomorphic encryption algorithm according to the receiver transaction amount random number, the transaction amount and the public key of the receiver;
the generation unit:
generating a difference value between the remitter transaction amount random number and the receiver transaction amount random number;
and adding the difference value of the remitter transaction amount random number and the receiver transaction amount random number into the transaction so that block chain nodes in a block chain verify that the transaction amount encrypted by the remitter transaction amount acceptance ciphertext is equal to the transaction amount encrypted by the receiver transaction amount acceptance ciphertext.
9. The apparatus of claim 7, the generation unit to:
generating a first authentication random number and a second authentication random number;
generating, by the homomorphic encryption algorithm, a random number acceptance ciphertext based on the first authentication nonce, the second authentication nonce, and the public key of the recipient;
performing hash operation on the transaction amount acceptance ciphertext of the receiving party and the random number acceptance ciphertext to obtain a hash abstract;
calculating and generating a first verification element corresponding to the first verification random number and a second verification element corresponding to the second verification random number according to the Hash abstract;
the receiver public key certificate comprises the random number commitment ciphertext, the first verification element and the second verification element.
10. The apparatus of claim 9, wherein the remitter balance commitment ciphertext is calculated by the homomorphic encryption algorithm from a remitter balance, a public key of the remitter, and a remitter random number;
the generation unit:
generating interval certification according to the remitter random number, the remitter transaction amount random number, the remitter balance commitment ciphertext, the transaction amount and the remitter transaction amount commitment ciphertext;
adding the interval certification to the transaction for a block link point in the block chain to verify whether the transaction amount satisfies: the transaction amount is not less than 0 and the transaction amount is not greater than the remittance balance.
11. The apparatus of any one of claims 7 to 10, the generating unit to:
generating an remitter electronic signature related to the remitter transaction amount acceptance ciphertext and the receiver transaction amount acceptance ciphertext through a remitter private key;
adding the electronic signature to the transaction for electronic signature verification by the blockchain link points in the blockchain.
12. The apparatus of claim 8, further comprising:
and the out-of-chain sending unit is used for sending the random number of the transaction amount of the receiving party to the receiving party through an out-of-chain channel.
13. A computer device, comprising: a memory and a processor; the memory having stored thereon a computer program executable by the processor; the processor, when executing the computer program, performs the method of any of claims 1 to 6.
CN202011554075.6A 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment Pending CN112651740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011554075.6A CN112651740A (en) 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011554075.6A CN112651740A (en) 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment
CN201811003743.9A CN109359974B (en) 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201811003743.9A Division CN109359974B (en) 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN112651740A true CN112651740A (en) 2021-04-13

Family

ID=65350310

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011554075.6A Pending CN112651740A (en) 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment
CN201811003743.9A Active CN109359974B (en) 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201811003743.9A Active CN109359974B (en) 2018-08-30 2018-08-30 Block chain transaction method and device and electronic equipment

Country Status (6)

Country Link
US (2) US11392942B2 (en)
EP (1) EP3811556B1 (en)
CN (2) CN112651740A (en)
SG (1) SG11202100621QA (en)
TW (1) TWI734090B (en)
WO (1) WO2020047169A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112990904A (en) * 2021-05-17 2021-06-18 北京荷月科技有限公司 Block chain-based transfer method and device and electronic equipment
CN113421096A (en) * 2021-08-17 2021-09-21 支付宝(杭州)信息技术有限公司 Block chain-based goods transaction method and device

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651740A (en) * 2018-08-30 2021-04-13 创新先进技术有限公司 Block chain transaction method and device and electronic equipment
CN111833057A (en) * 2018-09-30 2020-10-27 创新先进技术有限公司 Transaction method and device based on block chain and node equipment
CN110197433B (en) * 2018-10-25 2021-07-27 腾讯科技(深圳)有限公司 Numerical value transferring method, device and system
US11616816B2 (en) * 2018-12-28 2023-03-28 Speedchain, Inc. Distributed ledger based document image extracting and processing within an enterprise system
EP3935782A1 (en) * 2019-03-05 2022-01-12 HRL Laboratories, LLC A system and method for selective transparency for public ledgers
CN111698192B (en) * 2019-03-13 2021-12-03 华为技术有限公司 Method for monitoring transaction system, transaction device, monitoring device and system
CN110472957A (en) * 2019-08-20 2019-11-19 深圳市网心科技有限公司 A kind of block chain transaction verification method and relevant device
CN110730187A (en) * 2019-10-22 2020-01-24 全链通有限公司 Transaction verification method, accounting node and medium based on block chain
KR102227578B1 (en) * 2019-12-31 2021-03-15 주식회사 코인플러그 Method for serving certificate based on zero knowledge proof by using blockchain network, and server and terminal for using them
CN111160908B (en) * 2019-12-31 2023-11-17 深圳市迅雷网络技术有限公司 Supply chain transaction privacy protection system, method and related equipment based on blockchain
CN113132078B (en) * 2019-12-31 2023-07-14 航天信息股份有限公司 Block chain privacy protection method and block chain system based on homomorphism promise
CN113065951A (en) * 2020-01-02 2021-07-02 苏州同济区块链研究院有限公司 Transaction method, system, device, equipment and medium based on block chain
CN112651724A (en) * 2020-04-28 2021-04-13 北京邮电大学 Cross-chain interaction method, device and system
CN111654363B (en) * 2020-06-18 2023-12-29 福建师范大学 Group signature and homomorphic encryption-based alliance chain privacy protection method
CN112801785B (en) * 2021-01-13 2023-10-20 中央财经大学 Fair data transaction method and device based on blockchain intelligent contract
CN113159762B (en) * 2021-01-28 2024-04-09 武汉天喻信息产业股份有限公司 Blockchain transaction method based on Paillier and game theory
CN112953960B (en) * 2021-03-10 2023-02-03 东软集团股份有限公司 Identity authentication method, device and equipment for block chain access
CN113159745B (en) * 2021-03-23 2023-06-16 西安电子科技大学 Block chain transaction privacy protection method based on full homomorphism
CN113706150B (en) * 2021-10-27 2022-02-08 深圳前海微众银行股份有限公司 Block confirmation method and device
CN116527230B (en) * 2023-07-03 2023-09-15 湖南君创融信科技有限公司 Financial credit information data leakage prevention method and system
CN117094717B (en) * 2023-07-25 2024-03-29 湖北谊嘉金融仓储有限公司 Multi-user receivables right verification system based on blockchain encryption

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2004248501A1 (en) * 2003-06-13 2004-12-23 Orbid Limited Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
US20160342976A1 (en) * 2015-05-21 2016-11-24 Mastercard International Incorporated Method and system for linkage of blockchain-based assets to fiat currency accounts
CN106549749A (en) * 2016-12-06 2017-03-29 杭州趣链科技有限公司 A kind of block chain method for secret protection encrypted based on additive homomorphism
US20170357966A1 (en) * 2016-06-09 2017-12-14 Mastercard International Incorporated Method and system for use of a proprietary private blockchain
CN108021821A (en) * 2017-11-28 2018-05-11 北京航空航天大学 Multicenter block chain transaction intimacy protection system and method
WO2018115567A1 (en) * 2016-12-19 2018-06-28 Nokia Technologies Oy Method and apparatus for private data transfer between parties
CN108288157A (en) * 2018-01-25 2018-07-17 青岛闪收付信息技术有限公司 A kind of supply chain management method based on financial block chain technology
CN109359974B (en) * 2018-08-30 2020-10-30 创新先进技术有限公司 Block chain transaction method and device and electronic equipment

Family Cites Families (104)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2855343B1 (en) 2003-05-20 2005-10-07 France Telecom METHOD FOR ELECTRONIC GROUP SIGNATURE WITH REVOCABLE ANONYMAL, EQUIPMENT AND PROGRAMS FOR IMPLEMENTING THE METHOD
US7568615B2 (en) 2005-08-24 2009-08-04 E-Cash Financial, Inc. Electronic transfer of hard currency
US8498415B2 (en) 2007-11-27 2013-07-30 Bon K. Sy Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment
US20100078471A1 (en) 2008-09-30 2010-04-01 Apple Inc. System and method for processing peer-to-peer financial transactions
WO2012067214A1 (en) 2010-11-15 2012-05-24 日本電気株式会社 Information processing device, information processing method, and program
US9569771B2 (en) * 2011-04-29 2017-02-14 Stephen Lesavich Method and system for storage and retrieval of blockchain blocks using galois fields
AU2011213908A1 (en) 2011-08-26 2013-03-14 The Carapace Limited Improvements in or related to purchasing and/or performing financial transactions using a mobile phone
US9691056B2 (en) 2012-03-07 2017-06-27 Clearxchange, Llc System and method for transferring funds
US8676700B2 (en) 2012-03-26 2014-03-18 Depositslips Llc Methods and systems for handling currency
US10102510B2 (en) 2012-11-28 2018-10-16 Hoverkey Ltd. Method and system of conducting a cryptocurrency payment via a mobile device using a contactless token to store and protect a user's secret key
CN103903129B (en) 2012-12-28 2017-11-24 北京握奇数据系统有限公司 A kind of funds transfer system realized based on short message mode and method
JP2014220661A (en) * 2013-05-08 2014-11-20 株式会社東芝 Certification device, output device, verification device, input device, certification method, verification method and program
RU2663476C2 (en) 2013-09-20 2018-08-06 Виза Интернэшнл Сервис Ассосиэйшн Remote payment transactions protected processing, including authentication of consumers
KR101450013B1 (en) 2013-12-20 2014-10-13 주식회사 시큐브 Authentication system and method using Quick Response(QR) code
WO2015123691A1 (en) 2014-02-14 2015-08-20 Boemi Andrew A Mobile device payment system and method
CN104144379B (en) 2014-04-22 2016-04-13 腾讯科技(深圳)有限公司 Business data processing method, user terminal and service terminal
US9660805B2 (en) * 2014-05-14 2017-05-23 Porticor Ltd. Methods and devices for securing keys when key-management processes are subverted by an adversary
WO2015187372A1 (en) 2014-06-02 2015-12-10 Yottamine Analytics, Llc Digital event profile filters
IL234613A0 (en) 2014-09-11 2014-12-02 Google Inc Encrypted aggregated transaction data exchange with transaction data provider
US20160162897A1 (en) 2014-12-03 2016-06-09 The Filing Cabinet, LLC System and method for user authentication using crypto-currency transactions as access tokens
CN113946817A (en) * 2015-01-30 2022-01-18 E·马伊姆 System and method for managing networking commitments for secure entities
EP3262817A4 (en) 2015-02-27 2018-10-31 Visa International Service Association Transaction signing utilizing asymmetric cryptography
RU2673842C1 (en) 2015-03-20 2018-11-30 Ривец Корп. Device safety automatic certification with the use of the blocks chain
US20160321751A1 (en) 2015-04-28 2016-11-03 Domus Tower, Inc. Real-time settlement of securities trades over append-only ledgers
US9870562B2 (en) * 2015-05-21 2018-01-16 Mastercard International Incorporated Method and system for integration of market exchange and issuer processing for blockchain-based transactions
US11080665B1 (en) 2015-06-08 2021-08-03 Blockstream Corporation Cryptographically concealing amounts and asset types for independently verifiable transactions
WO2016200885A1 (en) 2015-06-08 2016-12-15 Blockstream Corporation Cryptographically concealing amounts transacted on a ledger while preserving a network's ability to verify the transaction
US10558996B2 (en) 2015-06-09 2020-02-11 Fidelity National Information Services, Llc Methods and systems for regulating operation of units using encryption techniques associated with a blockchain
CN107851253B (en) 2015-07-13 2022-03-04 日本电信电话株式会社 Contract consensus method, consensus verification method, contract consensus system, consensus verification device, contract consensus device, computer-readable recording medium
US10339523B2 (en) 2015-07-14 2019-07-02 Fmr Llc Point-to-point transaction guidance apparatuses, methods and systems
WO2017011601A1 (en) 2015-07-14 2017-01-19 Fmr Llc Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems
US20170048209A1 (en) 2015-07-14 2017-02-16 Fmr Llc Crypto Key Recovery and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
US10402792B2 (en) 2015-08-13 2019-09-03 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
WO2017054985A1 (en) 2015-09-30 2017-04-06 British Telecommunications Public Limited Company Access control
KR101637854B1 (en) 2015-10-16 2016-07-08 주식회사 코인플러그 Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain
US20180253702A1 (en) 2015-11-24 2018-09-06 Gartland & Mellina Group Blockchain solutions for financial services and other transactions-based industries
US10791123B2 (en) * 2015-11-25 2020-09-29 Yaron Gvili Selectivity in privacy and verification with applications
EP3384448B1 (en) 2015-11-30 2020-10-14 Shapeshift AG Systems and methods for improving security in blockchain-asset exchange
US20170236123A1 (en) 2016-02-16 2017-08-17 Blockstack Inc. Decentralized processing of global naming systems
NZ746878A (en) 2016-04-01 2022-11-25 Jpmorgan Chase Bank Na Systems and methods for providing data privacy in a private distributed ledger
US10460367B2 (en) * 2016-04-29 2019-10-29 Bank Of America Corporation System for user authentication based on linking a randomly generated number to the user and a physical item
US10333705B2 (en) 2016-04-30 2019-06-25 Civic Technologies, Inc. Methods and apparatus for providing attestation of information using a centralized or distributed ledger
US10046228B2 (en) * 2016-05-02 2018-08-14 Bao Tran Smart device
US10022613B2 (en) * 2016-05-02 2018-07-17 Bao Tran Smart device
KR101780636B1 (en) * 2016-05-16 2017-09-21 주식회사 코인플러그 Method for issuing certificate information and blockchain-based server using the same
US9785369B1 (en) 2016-05-23 2017-10-10 Accenture Global Solutions Limited Multiple-link blockchain
EP3472968A4 (en) 2016-06-16 2019-11-27 The Bank Of New York Mellon Distributed, centrally authored block chain network
US10181050B2 (en) 2016-06-21 2019-01-15 Mastercard International Incorporated Method and system for obfuscation of granular data while retaining data privacy
JP6663809B2 (en) 2016-07-07 2020-03-13 株式会社日立製作所 Audit device, anonymous remittance method with audit function and program
US10148646B2 (en) 2016-07-20 2018-12-04 Bank Of America Corporation Preventing unauthorized access to secured information systems using tokenized authentication techniques
US10057255B2 (en) 2016-07-20 2018-08-21 Bank Of America Corporation Preventing unauthorized access to secured information systems using multi-device authentication techniques
US20190228407A1 (en) 2016-07-25 2019-07-25 Tbcasoft, Inc. Digital property management on a distributed transaction consensus network
CN107666388B (en) 2016-07-28 2019-11-01 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
KR101914649B1 (en) 2016-08-31 2018-11-02 주식회사 케이비저축은행 Radio link authentication system and methods using Devices and automation devices
US10769600B2 (en) 2016-09-26 2020-09-08 International Business Machines Corporation Cryptocurrency transactions using debit and credit values
CN106548330B (en) 2016-10-27 2018-03-16 上海亿账通区块链科技有限公司 Transaction verification method and system based on block chain
US20190386814A1 (en) * 2016-11-07 2019-12-19 Sherjil Ahmed Systems and Methods for Implementing an Efficient, Scalable Homomorphic Transformation of Encrypted Data with Minimal Data Expansion and Improved Processing Efficiency
WO2018125989A2 (en) 2016-12-30 2018-07-05 Intel Corporation The internet of things
US10275739B2 (en) 2017-01-05 2019-04-30 International Business Machines Corporation Tracking assets with a blockchain
CN106845960B (en) 2017-01-24 2018-03-20 上海壹账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN106982205B (en) 2017-03-01 2020-05-19 中钞信用卡产业发展有限公司杭州区块链技术研究院 Block chain-based digital asset processing method and device
US20200394652A1 (en) 2017-03-08 2020-12-17 Ip Oversight Corporation A method for creating commodity assets from unrefined commodity reserves utilizing blockchain and distributed ledger technology
CN110365491B (en) * 2017-03-30 2021-03-26 腾讯科技(深圳)有限公司 Service processing method, device, equipment, storage medium and data sharing system
US10270599B2 (en) 2017-04-27 2019-04-23 Factom, Inc. Data reproducibility using blockchains
CA3064583A1 (en) * 2017-05-30 2018-12-06 Christos PATRINOS System of hardware and software to prevent disclosure of personally identifiable information
US20180365688A1 (en) 2017-06-14 2018-12-20 International Business Machines Corporation Transaction execution and validation in a blockchain
WO2018229631A1 (en) 2017-06-14 2018-12-20 nChain Holdings Limited Systems and Methods For Avoiding Or Reducing Cryptographically Stranded Resources On A Blockchain Network
US20180365691A1 (en) 2017-06-15 2018-12-20 KoopaCoin LLC Identity ledger in crypto currency transactions
CN107392603B (en) 2017-06-26 2021-03-16 中国人民银行数字货币研究所 Transaction method and apparatus using digital money
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
US10375037B2 (en) * 2017-07-11 2019-08-06 Swirlds, Inc. Methods and apparatus for efficiently implementing a distributed database within a network
DE102017212618B3 (en) * 2017-07-21 2018-12-13 Bundesdruckerei Gmbh Hardware system with blockchain
CN107360001B (en) * 2017-07-26 2021-12-14 创新先进技术有限公司 Digital certificate management method, device and system
CN111183445B (en) * 2017-08-01 2024-03-08 数字资产(瑞士)股份有限公司 Method and apparatus for digital asset auto-promise settlement
CN110959281B (en) * 2017-08-05 2022-03-22 普罗克鲁斯科技有限公司 Method and system for securing blockchains using transaction attestation
CA3073498A1 (en) 2017-08-25 2019-02-28 Token Iq, Inc. Methods and apparatus for value transfer
CN108418783B (en) * 2017-09-01 2021-03-19 矩阵元技术(深圳)有限公司 Method and medium for protecting privacy of intelligent contracts of block chains
CN107679976B (en) 2017-09-28 2021-02-12 电子科技大学 Auction method based on block chain
WO2019077126A1 (en) * 2017-10-20 2019-04-25 Koninklijke Kpn N.V. Primary and secondary blockchain device
CN108009441B (en) 2017-11-23 2023-05-30 创新先进技术有限公司 Method and apparatus for resource transfer and funds transfer
CN108173805B (en) * 2017-11-24 2020-12-01 西安电子科技大学 Block chain-based distributed anonymous area collaborative construction method with privacy preservation function
CN108418689B (en) 2017-11-30 2020-07-10 矩阵元技术(深圳)有限公司 Zero-knowledge proof method and medium suitable for block chain privacy protection
WO2019109003A1 (en) * 2017-11-30 2019-06-06 Visa International Service Association Blockchain system for confidential and anonymous smart contracts
IL256234A (en) 2017-12-10 2018-01-31 Kipnis Aviad Computation using somewhat homomorphic encryption
CN108111295B (en) * 2017-12-15 2020-08-25 河海大学 Homomorphic encryption method based on analog-to-analog operation
US9990504B1 (en) 2017-12-18 2018-06-05 Northern Trust Corporation Systems and methods for generating and maintaining immutable digital meeting records within distributed network nodes
CN108335106A (en) * 2018-01-24 2018-07-27 深圳壹账通智能科技有限公司 The more account books of Zero Knowledge based on block chain exchange transfer account method, device and storage medium
KR101914650B1 (en) 2018-03-13 2018-11-02 주식회사 케이비저축은행 Radio link authenticationsystem and methods using Devices and automationdevices
CN111886830A (en) 2018-03-23 2020-11-03 区块链控股有限公司 Computer-implemented system and method for data exchange
US10754989B2 (en) * 2018-03-27 2020-08-25 International Business Machines Corporation Runtime self-correction for blockchain ledgers
WO2019209168A2 (en) * 2018-04-26 2019-10-31 华为国际有限公司 Data processing method, related apparatus, and blockchain system
CN108711105A (en) 2018-05-16 2018-10-26 四川吉鼎科技有限公司 A kind of Secure Transaction verification method and system based on block chain
CN108764874B (en) 2018-05-17 2021-09-07 深圳前海微众银行股份有限公司 Anonymous transfer method, system and storage medium based on block chain
US11374736B2 (en) 2018-06-20 2022-06-28 Clemson University System and method for homomorphic encryption
US10810586B2 (en) * 2018-07-03 2020-10-20 Standard Transaction Co., Ltd. Currency information processor and currency information processing system
CN109034840B (en) 2018-07-06 2021-04-13 北京融链科技有限公司 Green certificate transaction method and system based on clean energy generation
US11223485B2 (en) 2018-07-17 2022-01-11 Huawei Technologies Co., Ltd. Verifiable encryption based on trusted execution environment
CN109359971B (en) 2018-08-06 2020-05-05 阿里巴巴集团控股有限公司 Block chain transaction method and device and electronic equipment
WO2020056487A1 (en) 2018-09-19 2020-03-26 Interbit Ltd. Method and system for performing hyperconvergence using blockchains
CN111833186A (en) * 2018-09-20 2020-10-27 创新先进技术有限公司 Transaction method and device based on block chain and node equipment
WO2019072269A2 (en) * 2018-11-07 2019-04-18 Alibaba Group Holding Limited Blockchain data protection using homomorphic encryption
CN109903026A (en) * 2018-12-14 2019-06-18 阿里巴巴集团控股有限公司 Event-handling method and device, electronic equipment based on block chain
JP6808057B2 (en) * 2018-12-21 2021-01-06 アドバンスド ニュー テクノロジーズ カンパニー リミテッド Blockchain data protection based on generic account model and homomorphic encryption
JP6871380B2 (en) 2018-12-29 2021-05-12 アドバンスド ニュー テクノロジーズ カンパニー リミテッド Information protection systems and methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2004248501A1 (en) * 2003-06-13 2004-12-23 Orbid Limited Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
US20160342976A1 (en) * 2015-05-21 2016-11-24 Mastercard International Incorporated Method and system for linkage of blockchain-based assets to fiat currency accounts
US20170357966A1 (en) * 2016-06-09 2017-12-14 Mastercard International Incorporated Method and system for use of a proprietary private blockchain
CN106549749A (en) * 2016-12-06 2017-03-29 杭州趣链科技有限公司 A kind of block chain method for secret protection encrypted based on additive homomorphism
WO2018115567A1 (en) * 2016-12-19 2018-06-28 Nokia Technologies Oy Method and apparatus for private data transfer between parties
CN108021821A (en) * 2017-11-28 2018-05-11 北京航空航天大学 Multicenter block chain transaction intimacy protection system and method
CN108288157A (en) * 2018-01-25 2018-07-17 青岛闪收付信息技术有限公司 A kind of supply chain management method based on financial block chain technology
CN109359974B (en) * 2018-08-30 2020-10-30 创新先进技术有限公司 Block chain transaction method and device and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MORI, P ET AL: "BroncoVote: Secure Voting System using Ethereum\'s Blockchain", 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), pages 96 - 107 *
田承东: "同态加密在物联网区块链数据安全中的应用", 网络安全技术与应用, no. 3, pages 34 - 36 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112990904A (en) * 2021-05-17 2021-06-18 北京荷月科技有限公司 Block chain-based transfer method and device and electronic equipment
CN113421096A (en) * 2021-08-17 2021-09-21 支付宝(杭州)信息技术有限公司 Block chain-based goods transaction method and device

Also Published As

Publication number Publication date
US20200279253A1 (en) 2020-09-03
US11341492B2 (en) 2022-05-24
US11392942B2 (en) 2022-07-19
TWI734090B (en) 2021-07-21
US20200074459A1 (en) 2020-03-05
CN109359974B (en) 2020-10-30
SG11202100621QA (en) 2021-02-25
WO2020047169A1 (en) 2020-03-05
TW202009842A (en) 2020-03-01
CN109359974A (en) 2019-02-19
EP3811556A1 (en) 2021-04-28
EP3811556B1 (en) 2021-10-13

Similar Documents

Publication Publication Date Title
CN109359974B (en) Block chain transaction method and device and electronic equipment
CN109359971B (en) Block chain transaction method and device and electronic equipment
US11689371B2 (en) Techniques for securing digital signatures using multi-party computation
CN108764874B (en) Anonymous transfer method, system and storage medium based on block chain
CN110457875B (en) Data authorization method and device based on block chain
US11144918B2 (en) Method, apparatus and electronic device for blockchain transactions
CN110473094B (en) Data authorization method and device based on block chain
TWI685240B (en) Blockchain transaction method and device, electronic equipment
TWI694399B (en) Block chain-based asset transfer method and device, and electronic equipment
CN110337665B (en) System and method for information protection
JP6841911B2 (en) Information protection systems and methods
CN110419053B (en) System and method for information protection
Franco Understanding Bitcoin: Cryptography, engineering and economics
CN109559224B (en) Credit investigation evaluation method and device and electronic equipment
CN109544129B (en) Block chain transaction method and device and electronic equipment
JP2019537744A (en) Information protection system and method
WO2021174927A1 (en) Blockchain-based identity verification method and apparatus, device, and storage medium
Marcedone et al. Minimizing trust in hardware wallets with two factor signatures
CN116667999A (en) Block chain-based data interaction method and device and computer equipment
CN115619548A (en) Privacy protection method, system and storage medium for transactions in alliance chain
Tanwar Hashing in Ecommerce (E-Banking).

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination